[1. Hogan, M., A. Sokol. NIST Cloud Computing Standards Roadmap. Version 2. NIST Cloud Computing Standards Roadmap Working Group. NIST Special Publications 500-291, NIST, Gaithersburg, MD, 2013, pp. 1-113.]Search in Google Scholar
[2. Columbus, L. Roundup of Cloud Computing Forecasts and Market Estimates 2016. 13 March 2016. https://www.forbes.com/sites/louiscolumbus/2016/03/13/roundup-of-cloud-computingforecasts-and-market-estimates-2016/#1c7e6a002187]Search in Google Scholar
[3. Khalil, I. M., A. Khreishah, M. Azeem. Cloud Computing Security: A Survey. -Computers, Vol. 3, 2014, pp. 1-35.10.3390/computers3010001]Search in Google Scholar
[4. Subashini, A., V. Kavith a. A Survey on Security Issues in Service Delivery Models of Cloud Computing. - Journal of Network and Computer Applications, Elsevier, Vol. 34, 2011, Issue 1, pp. 1-11.10.1016/j.jnca.2010.07.006]Search in Google Scholar
[5. HariKrishna, B., S. Kiran, G. Murali, PradeepKumar, R. Reddy. Security Issues in Service Model of Cloud Computing Environment. - Procedia Computer Science, Vol. 87, 2016, pp. 246-251.10.1016/j.procs.2016.05.156]Search in Google Scholar
[6. Bhadauria, R., S. Sanyal. Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques. - International Journal of Computer Applications, Vol. 47, 2012, No 18, pp. 47-66.10.5120/7292-0578]Search in Google Scholar
[7. Hashizume, K., D. G. Rosado, E. Ferná n d e z-Medina, E. B. Fernande z. An Analysis of Security Issues for Cloud Computing. - Journal of Internet Services and Applications, Vol. 4, 2013, No 5.10.1186/1869-0238-4-5]Search in Google Scholar
[8. Aldossary, S., W. Allen. Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions. - International Journal of Advanced Computer Science and Applications, Vol. 7, 2016, No 4.10.14569/IJACSA.2016.070464]Search in Google Scholar
[9. Catteddu, D., G. Hogben. Cloud Computing: Benefits, Risks and Recommendations for Information Security. European Union Agency for Network and Information Security (ENISA), 2009, pp. 1-125.]Search in Google Scholar
[10. Sumitra, B., C. R. Pethuru, M. Misbahuddin. A Survey of Cloud Authentication Attacks and Solution Approaches. - International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, 2014, Issue 10, pp. 6245-6253.]Search in Google Scholar
[11. Sushmitha, Y., V. KrishnaReddy, PavanDeja, D. Reddy. A Survey on Cloud Computing Security Issues. - International Journal of Computer Science and Innovation, Vol. 2015, 2015, No 2, pp. 88-96.]Search in Google Scholar
[12. HerbertRaj, P., P. RaviKumar, P. Jelciana. Mobile Cloud Computing: A Survey on Challenges and Issues. - International Journal of Computer Science and Information Security, Vol. 14, 2016, No 12, pp. 165-170.]Search in Google Scholar
[13. Brunette, G., R. Mo g h u l. Security Guidance for Critical Area of Focus in Cloud Computing. V2.1. Cloud Security Alliance (CSA). 2009, pp. 1-76.]Search in Google Scholar
[14. Xiao, Z., Y. Xiao. Security and Privacy in Cloud Computing. - IEEE Communications Surveys & Tutorial, Vol. 15, 2012, No 2, pp. 843-859.10.1109/SURV.2012.060912.00182]Search in Google Scholar
[15. Reed, A., C. Rezek, P. Simmonds. Security Guidance for Critical Area of Focus in CloudComputing. V3.0. Cloud Security Alliance (CSA). 2011, pp. 1-177. ]Search in Google Scholar
[16. Price, D. The Challenges of Multi-Tenancy. 26 March 2014. https://cloudtweaks.com/2014/03/challenges-multi-tenancy/]Search in Google Scholar
[17. RaviKumar, P., P. HerbertRaj, P. Jelciana. Exploring Data Seurity Issues and Solutions in Cloud Computing. - In: Proc. of 6th International Conference on Smart Computing and Communication (ICSCC’17)), National Institute of Technology, Kurukshetra, India, 7-8 December 2017.10.1515/cait-2017-0039]Search in Google Scholar
[18. Ludwig, S. Cloud 101: What the Heck Do IaaS, PaaS and SaaS Companies Do? VentureBeat, 14 November 2011. https://venturebeat.com/2011/11/14/cloud-iaas-paas-saas/]Search in Google Scholar
[19. Sookhak, M., H. Talebian, E. Ahmed, A. Gani, M. K. Khan. A Review on Remote Data Auditing in Single Cloud Server: Taxonomy and Open Issues. - Journal of Network and Computer Applications, Vol. 43, 2014, pp. 121-141.10.1016/j.jnca.2014.04.011]Search in Google Scholar
[20. Wo rlanyo, E. A Survey of Cloud Computing Security: Issues, Challenges and Solutions. 30 November 2015. http://www.cse.wustl.edu/~jain//cse570-15/ftp/cld_sec/index.html]Search in Google Scholar
[21. Amazon Web Services: Overview of Security Processes. August 2016. https://d0.awsstatic.com/whitepapers/aws-security-whitepaper.pdf]Search in Google Scholar
[22. Pesante, L. Introduction to Information Security. Carnegie Mellon University, 2008. https://www.us-cert.gov/sites/default/files/publications/infosecuritybasics.pdf]Search in Google Scholar
[23. Sabahi, F. Secure Virtualization for Cloud Environment Using Hypervisor-Based Technology. - International Journal of Machine Learning and Computing, Vol. 2, 2012, No 1, pp. 39-45.10.7763/IJMLC.2012.V2.87]Search in Google Scholar
[24. Gallagher, P. R. A Guide to Understanding Data Remanence in Automated Information Systems. The Rainbow Books. Chapter 3 and 4. 1991.]Search in Google Scholar
[25. OWASP Top 10 Application Security Risks - 2017. Open Web Application Security Project (OWASP). https://www.owasp.org/index.php/Category:OWASP_Top_Ten_2017_Project]Search in Google Scholar
[26. Taylor, P. J., J. Nufryk. CompTIA Security+ Exam Study Material, 2014. ]Search in Google Scholar
[27. Rathie, I. An Approach to Application Security. SANS Security Essentials White Paper, SANS Institute. https://www.sans.org/reading-room/whitepapers/application/approach-applicationsecurity-16]Search in Google Scholar
[28. OWASP Top 10 Backdoors, Open Web Application Security Project (OWASP). https://www.owasp.org/images/a/ae/OWASP_10_Most_Common_Backdoors.pdf]Search in Google Scholar
[29. Rouse, M. Data Integrity. September 2005. http://searchdatacenter.techtarget.com/definition/integrity]Search in Google Scholar
[30. Sun, Y., J. Zhang, Y. Xiong, G. Zhu. Data Security and Privacy in Cloud Computing. - International Journal of Distributed Sensor Networks, Vol. 10, 2014, Issue 7, pp. 1-9.10.1155/2014/190903]Search in Google Scholar
[31. Wang, C., S. Chow, Q. Wang, K. Ren, W. Lou. Privacy-Preserving Public Auditing for Secure Cloud Storage. - IEEE Transactions on Computers, Vol. 62, 2013, Issue 2, pp. 362-375.10.1109/TC.2011.245]Open DOISearch in Google Scholar
[32. Balusamy, B., P. Venkatak rishna, A. Vaidhyanathan, M. Ravikumar, N. Devi Munisamy. Enhanced Security Framework for Data Integrity Using Third-Party Auditing in the Cloud System. - In: Proc. of Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Springer, Vol. 325, 2015, pp. 25-31.10.1007/978-81-322-2135-7_4]Search in Google Scholar
[33. Atieniese, G., R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song. Provable Data Possession at Untrusted Stores. - In: Proc. of 14th ACM Conference on Computer and Communication Security, 2007, pp. 598-609.10.1145/1315245.1315318]Search in Google Scholar
[34. Atieniese, G., R. DiPuetro, L. V. Mancini, G. Tsudik. Scalable and Efficient Provable Data Possession. - In: Proc. of 4th International Conference on Security and Privacy in Communication Networks, Art. 9, 2008.10.1145/1460877.1460889]Search in Google Scholar
[35. Atieniese, G., R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, D. Song. Remote Data Checking using Provable Data Possession. - ACM Transaction of Information and System Security, Vol. 14, 2011, No 1, pp. 12-34.10.1145/1952982.1952994]Search in Google Scholar
[36. Wang, Q., C. Wang, K. Ren, W. Lou, J. L i. Enable Public Auditability and Data Dynamics for Storage Security in Cloud Computing. - IEEE Transactions of Parallel and Distributed Systems, Vol. 22, 2011, No 5, pp. 847-859.10.1109/TPDS.2010.183]Search in Google Scholar
[37. Sookhak, M., A. Gani, M. K. Khan, R. Buyya. Dynamic Remote Data Auditing for Securing Big Data Storage in Cloud Computing. - Information Sciences: An International Journal, Vol. 380, 2017, Issue C, pp. 101-116.10.1016/j.ins.2015.09.004]Search in Google Scholar
[38. CSCC Security for Cloud Computing Ten Steps to Ensure Success. - Cloud Standards Customer Council, 2015, pp. 1-35.]Search in Google Scholar
[39. Rouse, M. Authentication. February 2015. http://searchsecurity.techtarget.com/definition/authentication]Search in Google Scholar
[40. Shinder, D. L. Authentication in the Cloud. InfoSec Institute.13 August 2014. http://resources.infosecinstitute.com/authentication-cloud/#gref]Search in Google Scholar
[41. Jakimoski, K. Security Techniques for Data Protection in Cloud Computing. - International Journal of Grid and Distributed Computing, Vol. 9, 2016, No 1, pp. 49-56.10.14257/ijgdc.2016.9.1.05]Search in Google Scholar
[42. Ferril l. T. The Best Identity Management Solutions of 2017. 3 July 2017. https://www.pcmag.com/article2/0,2817,2491437,00.asp]Search in Google Scholar
[43. Data Backup: Cloud Computing VS On-Site Options. https://www.staples.com/content-hub/data-backup-cloud-computing-vs-on-site-options/]Search in Google Scholar
[44. Cloud Middleware. https://www.techopedia.com/definition/30630/cloud-middleware-software]Search in Google Scholar
[45. Farahzadi, A., P. Shams, J. Rezazadeh, R. Farahbak h s h. Middleware Technologies for Cloud of Things - A Survey. - Digital Communications and Networks, Elsevier, 18 April 2017. https://doi.org/10.1016/j.dcan.2017.04.00510.1016/j.dcan.2017.04.005]Open DOISearch in Google Scholar
[46. Nolle, T. How to Address Security Risks Posed by Middleware Tools. December 2014. http://searchmicroservices.techtarget.com/tip/How-to-address-security-risks-posed-bymiddleware-tools]Search in Google Scholar
[47. Role of Cloud Computing Operating Systems. 8 March 2013. http://www.getcloudservices.com/blog/role-of-cloud-computing-os/]Search in Google Scholar
[48. Hurwitz, J., M. Kaufma n. The Role of the Operating System in the Cloud Environment. Hurwitz White Paper, 2011. https://www.redhat.com/f/pdf/The_Role_of_the_OS_in_the_Cloud.pdf]Search in Google Scholar
[49. The Operating System Hardening Issues and Practices Information Technology Essay. 23 March 2015. https://www.ukessays.com/essays/information-technology/the-operating-systemhardening-issues-and-practices-information-technology-essay.php]Search in Google Scholar
[50. Liu, Y., Y. Sun, J. Ryoo, S. Rizvi. A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions. - Journal of Computing Science and Engineering, Vol. 9, 2015, No 3, pp. 119-133.10.5626/JCSE.2015.9.3.119]Search in Google Scholar
[51. Ristenpart, T., E. Tromer, H. Shacham, S. Savage. Hey, You Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. - In: Proc. of 16th ACM Conference on Computer and Communications Security, ACM, 2009, pp. 199-212.]Search in Google Scholar
[52. Aviram, A., S. Hu, B. Ford, R. Gummad i. Determinating Timing Channels in Compute Clouds. - In: Proc. of ACM Workshop on Cloud Computing Security Workshop, ACM, 2010, pp. 103-108.10.1145/1866835.1866854]Search in Google Scholar
[53. Jansen, W. A. Cloud Hooks: Security and Privacy Issues in Cloud Computing. - In: Proc. of IEEE 44th Hawaii International Conference on System Sciences (HICSS’11), IEEE, 2011, pp. 1-10.]Search in Google Scholar
[54. Wu, H., Y. Ding, C. Winer, L. Yao. Network Security for Virtual Machine in Cloud Computing. - In: Proc. of IEEE 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT’10), IEEE, 2010, pp. 18-21.]Search in Google Scholar
[55. Song, M. H. Analysis of Risks for Virtualization Technology. - Applied Mechanics and Materials, Vol. 539, 2014, pp. 374-377. 10.4028/www.scientific.net/AMM.539.374]Search in Google Scholar
[56. Corradi, A., M. Fanelli, L. Foschini. VM Consolidation: A Real Case Based on OpenStack Cloud. - Future Generation Computer Systems, Vol. 32, 2014, pp. 118-127.10.1016/j.future.2012.05.012]Open DOISearch in Google Scholar
[57. Zhang, F., H. Chen. Security-Preserving Live Migration of Virtual Machines in the Cloud. - Journal of Network and Systems Management, Vol. 21, 2013, No 4, pp. 562-587.10.1007/s10922-012-9253-1]Search in Google Scholar
[58. Cloud Server. https://www.techopedia.com/definition/29019/cloud-server]Search in Google Scholar
[59. What is a Cloud Server? IBM Cloud. https://www.ibm.com/cloud-computing/learn-more/what-is-a-cloud-server/]Search in Google Scholar
[60. Web Server Security and Database Server Security. https://www.acunetix.com/websitesecurity/webserver-security/]Search in Google Scholar
[61. Ellingwood, J. 7 Security Measures to Protect Your Servers. 5 March 2015. https://www.digitalocean.com/community/tutorials/7-security-measures-to-protectyour-servers]Search in Google Scholar
[62. Chakravarty, A. Importance of the Network in Cloud Computing. 25 January 2012. https://blogs.cisco.com/datacenter/importance-of-the-network-in-cloud-computing]Search in Google Scholar
[63. Schoo, P., V. Fusenig, V. Souza, M. Melo, P. Murray, H. Debar, H. Medhioub, D. Zeghlach e. Challenges for Cloud Networking Security. - In: Proc. of International Conference on Mobile Networks and Management, 2010, pp. 298-313.10.1007/978-3-642-21444-8_26]Search in Google Scholar
[64. Wang, J. J., S. Mu. Security Issues and Countermeasures in Cloud Computing. - In: Proc. of IEEE International Conference on Grey Systems and Intelligent Services (GSIS), 2011, pp. 843-846.10.1109/GSIS.2011.6043978]Search in Google Scholar
[65. McAfee Labs Threats Report. March 2016. https://www.mcafee.com/us/resources/reports/rp-quarterly-threats-mar-2016.pdf]Search in Google Scholar
[66. Top 7 Network Attack Types in 2016. Calyptix Blog. 13 June 2016. https://www.calyptix.com/top-threats/top-7-network-attack-types-2016/]Search in Google Scholar
[67. Ransom.WannaCry. Symantec Security Response. 24 May 2017. https://www.symantec.com/security_response/writeup.jsp?docid=2017-051310-3522-99&tabid=2]Search in Google Scholar
[68. Dalziel, H. Summary of 5 Major DoS Attack Types. 1 November 2013. https://www.concise-courses.com/5-major-types-of-dos-attack/]Search in Google Scholar
[69. DDOS Attacks. https://www.incapsula.com/ddos/ddos-attacks/]Search in Google Scholar
[70. Rouse, M. DNS Attack. July 2015. http://searchsecurity.techtarget.com/definition/DNS-attack]Search in Google Scholar
[71. Common Types of Network Attacks. https://technet.microsoft.com/en-us/library/cc959354.aspx]Search in Google Scholar
[72. Vieira, K., A. Schulter, C. B. Westphall, C. M. Westphall. Intrusion Detection for Grid and Cloud Computing. - IT Professional, IEEE Computer Society, Vol. 12, 2010, Issue 4, pp. 38-43.10.1109/MITP.2009.89]Search in Google Scholar
[73. Lo, C. C., C. C. Huang, J. K u. A Cooperative Intrusion Detection System Framework for Cloud Computing Networks. - In: Proc. of 39th International Conference on Parallel Processing Workshops (ICPPW), IEEE, 2010, pp. 280-284.10.1109/ICPPW.2010.46]Search in Google Scholar
[74. Rouse, M. Secure Sockets Layer (SSL). November 2016. http://searchsecurity.techtarget.com/definition/Secure-Sockets-Layer-SSL]Search in Google Scholar